The internet was born around the 1960‟s where its access was limited to a few scientists, researchers and the defense only. Internet user base have evolved expontinanlty. Initially, computer crime was only confined to making physical damage to the computer and related infrastructure. Around the 1980‟s the trend changed from causing physical damage to computers to making a computer malfunction using a malicious code called virus. Till then the effect was not so widespread because the internet was only confined to defense setups, large international companies and research communities. In 1996, when the internet was launched for the public, it immediately became popular among the masses and they slowly became dependent on it to an extent that it have changed their lifestyle. The GUIs were written so well that the user don‟t have to bother how the internet was functioning. They have to simply make a few clicks over the hyperlinks or type the desired information at the desired place without bothering where this data is stored and how it is sent over the internet or whether the data can be accessed by another person who is connected to the internet or whether the data packet sent over the internet can be soofed and tempered. The focus of computer crime shifted from barely damaging the computer or destroying or manipulating data for personal benefit to financial crime. These computer attacks are increasing at a rapid pace. Every second around 25 computers became victims of cyber attacks and around 800 million individuals are affected by it till 2013. CERT-India has reported around 308371 Indian websites being hacked between 2011-2013. It is also estimated that around $160 million are lost per year due to cybercrime. This figure is very conservative as most of the cases are never reported.
According to the 2013-14 report of the standing committee on Information Technology to the 15th Lok Sabha by the ministry of communication and information technology, India is the third-largest number do Internet users throughout the world with an estimated 100 million internet users as on June, 2011 and the numbers are growing rapidly. There are around 22 million broadband connections in India till date operated by around 134 major Internet Service Providers(ISPs).
The term cybercrime is used to describe an unlawful activity in which computer or computing devices such as smartphones, tablets, Personal Digital Assistants(PDAs), etc. which are stand alone or a part of a network are used as a tool or/and target of criminal activity. It is often committed by the people of destructive and criminal mindset either for revenge, greed or adventure.
There are many reasons which act as a catalyst in the growth of cyber crime. Some of the prominent reasons are: a. Money: People are motivated towards committing cyber crime is to make quick and easy money. b. Revenge: Some people try to take revenge with other person/organization/society/ caste or religion by defaming its reputation or bringing economical or physical loss. This comes under the category of cyber terrorism. c. Fun: The amateur does cybercrime for fun. They just want to test the latest tool they have encountered. d. Recognition: It is considered to be pride if someone hack highly secured networks like defense sites or networks. e. Anonymity- Many time the anonymity that cyberspace provides motivates the person to commit cybercrime as it is much easy to commit a cybercrime over cyberspace and remain anonymous as compared to the real world. It is much easier to get away with criminal activity in a cyber world than in the real world. There is a strong sense of anonymity that can draw otherwise respectable citizens to abandon their ethics in pursuit of personal gain. f. Cyber Espionage: At times the government itself is involved in cyber trespassing to keep eye on other person/networks/countries. The reason could be politically, economically socially motivated.
There are many cyber security techniques to combat the cyber security attacks. The next section discusses some of the popular techniques to counter the cyber attacks.
AUTHENTICATION
It is a process of identifying an individual and ensuring that the individual is the same who he/she claims to be. A typical method for authentication over the internet is via username and password. With the increase in the reported cases of cyber crime by identity theft over the internet, the organizations have made some additional arrangements for authentication like One Time Password(OTP), as the name suggests it is a password which can be used one time only and is sent to the user as an SMS or an email at the mobile number/email address that he has specified during the registration process. It is known as the two-factor authentication method and requires two types of evidence to authentication an individual to provide an extra layer of security for authentication. Some other popular techniques for two-way authentication are: biometric data, physical tokens, etc. which are used in conjunction with username and password.
The authentication becomes more important in light of the fact that today multinational organizations have changed the way the business was to be say, 15 years back. They have offices present around the Globe, and an employee may want access which is present in a centralized server. Or an employee is working from home and not using the office intranet and wants access to some particular file present in the office network. The system needs to authenticate the user and based on the credentials of that user, may or may not provide access to the user to information he requested. The process of giving access to an individual to certain resources based on the credentials of an individual is known as authorization and often this process goes hand-in-hand with authorization. Now, one can easily understand the role of a strong password for authorization to ensure cyber security as an easy password can be a cause of security flaws and can bring the whole organization at high risk. Therefore, the password policy of an organization should be such that employees are forced to use strong passwords (more than 12 characters and a combination of lowercase and uppercase alphabets along with numbers and special characters) and prompt user to change their password frequently. In some of the bigger organizations or an organization that deals in sensitive information like defense agencies, financial institutions, planning commissions, etc. a hybrid authentication 27
the system is used which combines both the username and password along with hardware security measures like biometric system, etc. Some of the larger organizations also use VPN(Virtual Private Network), which is one of the methods to provide secure access via hybrid security authentication to the company network over the internet.
ENCRYPTION
It is a technique to convert the data in the unreadable form before transmitting it over the internet. Only the person who have the access to the key and converts it into a readable form and reads it. Formally encryption can be defined as a technique to lock the data by converting it too complex codes using mathematical algorithms. The code is so complex that it even the most powerful computer will take several years to break the code. This secure code can safely be transmitted over the internet to the destination. The receiver, after receiving the data can decode it using the key. The decoding of the complex code to the original text using key is known as decryption. If the same key is used to lock and unlock the data, it is known as symmetric key encryption. In symmetric-key encryption, after coding of data, the key is sent to the destination user via some other medium like postal service, telephone, etc. because if the key is obtained by the hacker, the security of the data is compromised. Key distribution is a complex task because the security of key while transmission is itself an issue. To avoid the transfer of key a method called asymmetric key encryption, also known as public-key encryption, is used. In asymmetric key encryption, the key used to encrypt and decrypt data are different. Every user posse‟s two keys viz. public key and private key. As the name suggests, the public key of every user is known to everyone but the private key is known to the particular user, who owns the key, only. Suppose sender A wants to send a secret message to receiver B through internet. A will encrypt the message using B‟s public key, as the public key is known to everyone. Once the message is encrypted, the message can safely be sent to B over the internet. As soon as the message is received by B, he will use his private key to decrypt the message and regenerate the original message.
DIGITAL SIGNATURES
It is a technique for the validation of data. Validation is the process of certifying the content of a document. The digital signatures not only validate the data but also used for authentication. The digital signature is created by encrypting the data with the private key of the sender. The encrypted data is attached along with the original message and sent over the internet to the destination. The receiver can decrypt the signature with the public key of the sender. Now the decrypted message is compared with the original message. If both are the same, it signifies that the data is not tempered and also the authenticity of the sender is verified as someone with the private key(which is known to the owner only) can encrypt the data which was then decrypted by his public key. If the data is tempered while transmission, it is easily detected by the receiver as the data will not be verified. Moreover, the massage cannot be re-encrypted after tempering as the private key, which is possessed only by the original sender, is required for this purpose. As more and more documents are transmitted over the internet, digital signatures are an essential part of the legal as well as the financial transition. It not only provides the authentication of a person and the validation of the document, it also prevents the denial or agreement at a later stage. Suppose a shareholder instructs the broker via email to sell the share at the current price. After the completion of the transaction, by any chance, the shareholder reclaims the shares by claiming the email to be forged or bogus. To prevent these unpleasant situations, digital signatures are used.
ANTIVIRUS
There are verities of malicious programs like viruses, worms, trojan horses, etc that are spread over the internet to compromise the security of a computer either to destroy data stored into the computer or gain financial benefits by sniffing passwords, etc. To prevent these malicious codes to enter to your system, a special program called an anti-virus is used which is designed to protect the system against viruses. It not only prevents the malicious code to enter the system but also detects and destroys the malicious code that is already installed into the system. There are lots of new viruses coming every day. The antivirus program regularly updates its database and provides immunity to the system against these new viruses, worms, etc.
FIREWALL
It is a hardware/software which acts as a shield between an organization‟s network and the internet and protects it from the threats like viruses, malware, hackers, etc. It can be used to limit the persons who can have access to your network and send information to you. There are two types of traffic in an organization viz. inbound traffic and outbound traffic. Using a firewall, it is possible to configure and monitor the traffic of the ports. Only the packets from trusted source addresses can enter the organization‟s network and the sources which are blacklisted and unauthorized addresses are denied access to the network. It is important to have firewalls to prevent the network from unauthorized access, but a firewall does not guarantee this until and unless it is configured correctly. A firewall can be implemented using hardware as well as software or a combination of both.
Hardware Firewalls: example of hardware firewalls are routers through which the network is connected to the network outside the organization i.e. Internet.
Software Firewalls: These firewalls are installed and installed on the server and client machines and it acts as a gateway to the organization‟ network.
In the operating system like Windows 2003, Windows 2008, etc. it comes embedded with the operating system. The only thing a user needs to do is to optimally configure the firewall according to their own requirement. The firewalls can be configured to follow “rules” and “policies” and based on these defined rules the firewalls can follow the following filtering mechanisms.
Proxy- all the outbound traffic is routed through proxies for monitoring and controlling the packet that are routed out of the organization.
Packet Filtering- based on the rules defined in the policies each packet is filtered by its type, port information, and source & destination information. Example of such characteristics is IP address, Domain names, port numbers, protocols etc. Basic packet filtering can be performed by routers.
Stateful Inspection: rather than going through all the fields of a packet, key features are defined. The outgoing/incoming packets are judged based on those defined characteristics only.
The firewalls are an essential component of the organization‟ network. They not only protect the organization against the virus and other malicious code but also prevent the hackers to use your network infrastructure to launch DOS attacks.
STEGANOGRAPHY
It is a technique of hiding secret messages in a document file, image file, program or protocol, etc. such that the embedded message is invisible and can be retrieved using special software. Only the sender and the receiver know about the existence of the secret message in the image. The advantage of this technique is that these files are not easily suspected. There are many applications of steganography which include sending secret messages without ringing the alarms, preventing secret files from unauthorized and accidental access and theft, digital watermarks for IPR issues, etc.